INFO TECH Final
If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.
$500.00
The text contained in about 4 books uses approximately ___ times more data than a short email.
1,000
Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.
10
Blu-rays provide approximately ___ of storage space.
25 GB
According to YouTube, approximately how much video is uploaded to its site every minute?
300 hours
A typical laptop has a storage capacity of approximately ____ .
500 GB - 1 TB
CDs provide approximately ___ of data storage space.
700 MB
Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
AUPs
Using a corporation's data in real-time requires effective data management strategies for developing advanced analytics. This is a fundamental part of ___ .
Business Intelligence (BI)
Which optical drive media stores approximately 700 MBs of data?
CD
A technology called ___ may change the way doctors treat HIV, cancer, and antibiotic resistant bacterial infections.
CRISPR
It will be even more difficult to know if students are paying attention when they're wearing the ___ that Sony is developing. They play and record video!
Contact lenses
Which of the following statements about Facebook is true? Ones that were not true: 1. Potential employers are prohibited from searching Facebook pages. 2. Photo tagging dosen't create a link to your Facebook Timeline. 3. Anything posted on Facebook is private.
Cyberstalking and online predators are a real problem on Facebook.
Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.
DNA
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .
Data Analyst
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
EDI
Business management software that encompasses nearly all business activities in a corporation is called ___ software.
ERP
EDI stands for ___ .
Electronic Data Interchange
Prototypes of this company's technology lets deaf people's skin mimic the ear's cochlea that translates sound into specific frequencies for the brain.
Which social media company has invested in technology that might allow the deaf to hear through their skin?
The amount of time it takes data to travel from devices to a datacenter and back is called __________ .
Latency
The 2 most common audio file formats are WAV and ___ .
MP4
The field of study that gives computers the ability to learn without being explicitly programmed is called ___ .
Machine Learning
Developed and designed to help teams collaborate globally in real-time, Canvus Connect collaboration software that makes it possible for remote users to share, draw, manipulate, and input information in on a single board was developed by __________.
MultiTaction
Luke Skywalker lost an arm in Episode V. In the movie it was replaced with an artificial limb that was connected to his body's nervous system. This technology is coming closer to reality in the field of ___ .
Neuroprosthetics
Which of the following is an email program?
Outlook
A big problem when travelling is not being able to converse in a foreign language. To address this issue, Waverly Labs developed ___, a earpiece that links by Bluetooth to a translating app.
Pilot
When you personally share an image on Pinterest it is known as a _____.
Pin
Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage.
RAID
Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.
SSDs
Pictures or videos taken and shared on Snapchat are called _____.
Snaps
Which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
Trade
One type of storage device is a ___ .
Usb drive
CDs store data using ___ .
a reflective coating that has pits and lands
DVDs store data using ___ .
a reflective coating that has pits and lands
A learning platform that uses algorithms to adjust the content that each student sees in order to maximize learning efficiency is called a(n) ___ learning platform.
adaptive
Dash Replenishment Service enables Internet-connected coffee makers to order filters from ___ when supplies are running low.
amazon
Natural language processing is when computers can understand human speech exactly as it is spoken. This is a major challenge being addressed by ___ .
artificial intelligence (AI)
The smallest unit of data storage is a ___ .
bit
Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.
blockchain
One character of information, for example, a letter or a number consists of one ___ of storage
byte
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ storage.
cloud
Emailing a file to yourself is an example of using ___ storage.
cloud
The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.
cloud
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
A major challenge facing software designers and database managers involved with ERP is that with the Internet of Things, the amount of ___ becomes unmanageable.
data
Because of the significant information it can reveal about the electorate, ___ mining has become increasingly important to campaign managers.
data
One disadvantage of cloud storage is that
data is only available when you're online
Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . (Most often, this crime is committed by employees inside the company rather than outside hackers.)
data theft
Google and Novartis International Global Healthcare Company teamed up to create a smart contact lens that can help patients with ___ .
diabetes
Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.
diabetes
To increase Internet transmission speeds and decrease latency (delays), intermediate Internet servers are placed between users and the cloud servers. Portions of the cloud service are downloaded onto the intermediate servers. This is known as ___ computing.
edge
Solid state drives store data using ___ .
electronic circuits
A desktop computer's RAM is measured in __ of data.
gigabytes
Storage capacity for laptop hard drives is typically described in terabytes or ___ .
gigabytes
An example of software that has antiplagiarism features, as well as grammar checking, is ___ .
grammarly
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.
helium
All of the following are true about RFID except These are the true: 1. it can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip. 2. RFID stands for Radio Frequency Identification. 3. RFID doesn't require line of sight scanning.
high-frequency RFID can transmit signals further than 1500 feet.
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.
holographic
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
holographic
All of the following should be considered when using Twitter except
if a Twitter user has been blocked you can file a formal complaint through Twitter.
In the body of a professionally formatted business email, where should a request be placed?
in the first sentence of the body of your email
A short email uses about one ___ of data.
kilobyte
It's always a good idea to check the ___ before clicking Reply to All.
list of addresses
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
longer
Most desktop computers use ___ to store data.
magnetic hard drives
Be careful to only open email from senders you know and trust. ___ may be contained in email messages.
malware
When referring to business information technology, MIS stands for ___ .
management information systems
One of the largest data requirements of the future will likely be ___ .
mapping patients' genomes
A million bytes of data equals approximately one ___
megabyte
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
memristor
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
All of the following are part of an RFID system except _____.
network
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
All of the following are protected against unauthorized use or distribution by intellectual property laws except Ones that are true: 1. music 2. video games 3. movies
open educational resources.
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .
optical drive
Server banks have capacities measured in ___ .
petabytes
Blu-ray stores data using ___ .
pits and lands that are read by a blue spectrum laser beam
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online video games
On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.
profile
A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.
quantum
When referring to digital storage, RAID stands for ___ .
redundant array of independent discs
Pulsed laser technology called lidar to detect and monitor the environment is an integral part of ___ .
self-driving trucks
Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.
separation
In general, the ___ the access time, the faster the hard drive.
shorter
Currently apps that run on the cloud are __________ compared to apps that run on local machines (the Edge).
slower
While every election has its losers, one big winner in the 2016 U.S. presidential election was ___ media.
social
When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.
software piracy
While not a required step in sending an email, it's wise to ___ any message before clicking Send.
spell check
The component of a computer that allows data to be retained after power is turned off is referred to as _______.
storage
When you see you coworker visiting porn sites at work you should ---
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
A thousand gigabytes equals one ___ .
terabyte
Along with the From line, what is the most important factor in ensuring your business message is read?
the subject line
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
top level managers
A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.
wire-wire